Distributed web hacking by adaptive consensus-based reinforcement learning
In this paper, we propose a novel adaptive consensus-based learning algorithm for
automated and distributed web hacking. We aim to assist ethical hackers in conducting …
automated and distributed web hacking. We aim to assist ethical hackers in conducting …
[HTML][HTML] Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents
In this paper, we propose a formalization of the process of exploitation of SQL injection
vulnerabilities. We consider a simplification of the dynamics of SQL injection attacks by …
vulnerabilities. We consider a simplification of the dynamics of SQL injection attacks by …
Automating privilege escalation with deep reinforcement learning
AI-based defensive solutions are necessary to defend networks and information assets
against intelligent automated attacks. Gathering enough realistic data for training machine …
against intelligent automated attacks. Gathering enough realistic data for training machine …
The Reality of Internet Infrastructure and Services Defacement: A Second Look at Characterizing Web-Based Vulnerabilities
N Albalawi, N Alamrani, R Aloufi, M Albalawi, A Aljaedi… - Electronics, 2023 - mdpi.com
In recent years, the number of people using the Internet has increased worldwide, and the
use of web applications in many areas of daily life, such as education, healthcare, finance …
use of web applications in many areas of daily life, such as education, healthcare, finance …
Towards dynamic capture-the-flag training environments for reinforcement learning offensive security agents
In this paper, we propose a formalised process for the generation of dynamically generated
SQL queries that are vulnerable to SQL injection attacks for the training of reinforcement …
SQL queries that are vulnerable to SQL injection attacks for the training of reinforcement …
Impact of computer users on cyber defense strategies
CD Colvett, MD Petty, JA Bland - Systems Engineering, 2024 - Wiley Online Library
Cybersecurity research often focuses primarily or exclusively on the interactions between
the attacker, trying to exploit the computer system, and the defender, trying to protect it …
the attacker, trying to exploit the computer system, and the defender, trying to protect it …
Behaviour-diverse automatic penetration testing: a coverage-based deep reinforcement learning approach
Reinforcement Learning (RL) is gaining importance in automating penetration testing as it
reduces human effort and increases reliability. Nonetheless, given the rapidly expanding …
reduces human effort and increases reliability. Nonetheless, given the rapidly expanding …
Language agents as hackers: Evaluating cybersecurity skills with capture the flag
Amidst the advent of language models (LMs) and their wide-ranging capabilities, concerns
have been raised about their implications with regards to privacy and security. In particular …
have been raised about their implications with regards to privacy and security. In particular …
[PDF][PDF] Automating XSS Vulnerability Testing Using Reinforcement Learning.
K Hasegawa, S Hidano, K Fukushima - ICISSP, 2023 - scitepress.org
Cross-site scripting (XSS) is a frequently exploited vulnerability in web applications. Existing
XSS testing tools utilize a brute-force or heuristic approach to discover vulnerabilities, which …
XSS testing tools utilize a brute-force or heuristic approach to discover vulnerabilities, which …
[BOOK][B] Modeling and simulation of cyberattacks to aid systems security engineers and cyber-physical designs to aid systems engineers
CD Colvett - 2023 - search.proquest.com
The advent of the Internet has led to an ever-increasingly interconnected world. The range of
cyber-physical systems being interconnected has expanded to include power generation …
cyber-physical systems being interconnected has expanded to include power generation …